SOC Analyst L2
Australia
Black Box
Black Box is the leading provider of copper cabling, patch cabling, and bulk cable for your business communications system. Contact us today.Responsibilities:
- Act as the primary point of contact for incident escalations from Tier 1/2 analysts.
- Act as technical contributor during major security incidents contributing to improvement in the team’s capability.
- Lead the investigation and response to security incidents, leveraging advanced technical skills and threat intelligence.
- Triage security alerts, perform in-depth analysis to determine root cause and impact, and develop effective containment and remediation strategies.
- Develop and execute incident response plans, ensuring proper communication and documentation throughout the incident lifecycle.
- Work in a ‘business hours + rostered on-call’ environment
- Utilize SIEM (Security Information and Event Management) and other security tools to identify and analyze potential threats.
- Develop and fine-tune security rules and correlation logic to improve threat detection capabilities.
- Maintain detailed documentation of security incidents, investigations, and response actions.
Requirements:
- 5-7 years of experience in a SOC or security analyst role.
- Proven track record of successfully identifying, analyzing, and responding to security incidents.
- Strong background in formulation and execution of threat hunt scenarios and the development of subsequent use cases to uplift detection capability.
- Experience working on any of the scripting languages such as Python etc.
- Relevant industry certifications such as GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), or CompTIA Security or Vendor certs are highly desirable.
- In-depth knowledge of Sentinel, Splunk, CrowdStrike, Securonix, LogRhythm, Rapid7 MS Defender, other Threat centric tools, IDS/IPS, email security, vulnerability scanners and other security technologies.
- Detection and mitigation strategies for a broad range of cyber threats, including malware, DDOS, hacking, phishing, lateral movement and data exfiltration.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
6
0
0
Categories:
Analyst Jobs
Incident Response Jobs
Tags: CISSP CompTIA CrowdStrike DDoS GCIH GIAC IDS Incident response IPS LogRhythm Malware Python Scripting Sentinel SIEM SOC Splunk Threat detection Threat intelligence
Region:
Asia/Pacific
Country:
Australia
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Security Operations Engineer jobsSystems Administrator jobsIT Security Analyst jobsSenior Cloud Security Engineer jobsSenior Cybersecurity Engineer jobsSenior Security Analyst jobsSenior Information Security Analyst jobsCyber Security Specialist jobsInformation Security Manager jobsSenior Network Security Engineer jobsSecurity Consultant jobsSenior Product Security Engineer jobsInformation System Security Officer (ISSO) jobsChief Information Security Officer jobsInformation Systems Security Engineer jobsSenior Information Security Engineer jobsSecurity Specialist jobsSenior Cyber Security Engineer jobsIT Security Engineer jobsCyber Threat Intelligence Analyst jobsSenior IT Auditor jobsSecurity Operations Analyst jobsCybersecurity Specialist jobsSenior Software Engineer jobsNetwork Engineer jobs
Java jobsBash jobsTS/SCI jobsEncryption jobsEDR jobsSDLC jobsSplunk jobsMalware jobsThreat detection jobsRMF jobsFinance jobsTerraform jobsTop Secret jobsForensics jobsIDS jobsCompTIA jobsSQL jobsITIL jobsIPS jobsActive Directory jobsSOC 2 jobsDocker jobsOWASP jobsClearance Required jobsGIAC jobs
Intrusion detection jobsCRISC jobsAnsible jobsVPN jobsTCP/IP jobsOSCP jobsHIPAA jobsDoDD 8570 jobsMITRE ATT&CK jobsData Analytics jobsZero Trust jobsJavaScript jobsSOAR jobsIT infrastructure jobsBanking jobsCCSP jobsSOX jobsIndustrial jobsUNIX jobsDNS jobsJira jobsNIST 800-53 jobsGCIH jobsKPIs jobsCISO jobs